15 webcasts found
+ 212 past events found
Back to Search Begin New Search Save Search Auto-Notify
Proven Practices for Securing Sensitive...
The U.S. federal government recently initiated a Cloud First policy, dramatically expanding its use of the public cloud. However, expansion to the cloud does bring potential risks to information security and regulatory compliance, resulting in projects being delayed, and in a few cases, even canceled altogether. Join us for a complimentary webcast as we discuss the data security questions agencies should consider, practices that organizations...
Add Favorite
Improved Government Video Streaming and...
IQM2 is taking government streaming to a new level with innovative government processes and specific video streaming technology, creating incredible excitement and rapid migration to IQM2’s new tools. Please join us for a complimentary webcast to learn why upgrading your government video streaming program and system is vital for your agency and community. During this webcast we will explore how IQM2’s government video streaming wil...
Add Favorite
Scalable and Cost-Effective Virtual Des...
As IT environments become increasingly complex, organizations must re-evaluate how they manage IT, secure data, and enable workplace mobility. Cisco, Nimble Storage, and VMware have partnered to create a complete validated solution and reference architecture for midsized VDI deployments that is cost effective and easy to manage. This joint solution takes the guesswork out of VDI planning and validation, helping government agencies accelerate t...
Add Favorite
Enhancing VMware Horizon View with F5 S...
Desktop and endpoint device management has long been a challenge for IT organizations. End users demand flexibility, multiple access options, and desktop customization, while business units often require multiple desktop types based on their business and technical requirements: Windows 7 for sales and staff in the field, Windows XP for accounting, Mac for creative design, and Linux for technical staff. This kind of multi-level matrix can be a...
Add Favorite
APTs, Viruses, and Zero-Days Seen as Bi...
Cyber attacks have changed dramatically over just a few years. Broad, scattershot attacks designed for mischief have been replaced by attacks that are advanced, targeted, stealthy, and persistent. A compelling new survey reveals the growing concern of the advanced persistent threat (APT) against government organizations. Join FireEye and Carahsoft for a live webcast to gain insight and useful information from your government colleagues across...
Add Favorite
Healthcare Agencies Reveal the Challeng...
The way healthcare agencies are using and exchanging information is changing dramatically. These constant changes often conflict with the need to rapidly share data with authorized parties while meeting requirements to protect patient data. OpenText recently conducted a survey with many major healthcare professionals to discuss how they are meeting and addressing these problems. Join us for this complimentary webinar to discuss the results and...
Add Favorite
Producing High-Value, Actionable Inform...
Join us to learn how new, exciting technologies are evolving in the Big Data community today. This webcast will showcase how these new technologies can be applied in emerging use cases such as law enforcement, supplying real-time sensor data to transportation networks, providing cyber security, mining social media to prevent terrorism, or geospatial imagery for crop yield. Hugh Njemanze, Entrepreneur in Residence at the venture capital firm Kl...
Add Favorite
Intelligent Image and Video Search
Image and full motion video content are among the fastest growing digital assets for government organizations and agencies, yet over 95 percent of this content goes unviewed and unexploited. While a range of advanced tools exist to support text and web-based data searches and analyses, there currently aren’t any viable solutions for indexing and searching image and full motion video content. piXlogic is pleased to present piXserve, an en...
Add Favorite
The Most Effective Security Meets the M...
The leading Websense® real-time security defenses against advanced threats and data theft now integrate with the F5® BIG-IP® platform, securely connecting users to fast and highly available applications. Protect your enterprise application data from loss or theft, while protecting users accessing the web from main offices, remote, or mobile locations. Optimize and load balance web traffic, increase SSL performance, and layer identi...
Add Favorite
Streamlining the Budget Publication, PA...
Many public sector agencies use inefficient, error-prone processes to collect, edit, and report on budget and performance data and provide narrative analysis, such as budget formulation documentation and performance reports. Often, financial and operational data is exported from multiple performance management systems and data warehouses from various programs and re-keyed into ‘master’ spreadsheets with few or no controls in place....
Add Favorite
Back to Search Begin New Search